Section 01: Information Security
Information Security
Information security
CIA Triad
CIA triad
Non-repudiation
Attack Classification
Passive attack
Attacks that do not directly / actively engage with the target system(s). Examples:
Searching google (googling)
Network traffic analysis
Active attack
Attacks that do directly / active engage with the target system(s). Examples:
Brute forcing
Sending malicious payloads
Web app spidering
Close-in attack
Attacks where the attacker is physically close to the target system.
Insider attack
Attacks where the attacker is inside of the organization / infrastructure. Examples:
Shoulder surfing passwords
Misusing privileged access
Information Warfare
Information warfare
Last updated